ICDF2C 2013 – Crocus Expo, Moscow
Final Program
Day 1: 26th September 2013, Thursday |
|
10:00 - 10:30 |
Registration |
10:30 - 11:30 |
Session I: Opening Session |
Keynote speech by Mr. Kunwon Yang, Assistant Director of INTERPOL Digital Forensics Laboratory, INTERPOL Global Complex for Innovation |
|
Keynote speech by Alexey Yakovlev, Assistant Director of the Digital Forensic Service of the Investigtative Committee of Russian Federation |
|
11:30 - 11:45 |
Coffee Break |
11:45 - 12:15 |
Session II: Investigations of Internet Crimes against Children |
Kathryn Seigfried-Spellar |
|
Distinguishing the Viewers, Downloaders, and Exchangers of Internet Child Pornography by Individual Differences: Preliminary Findings |
|
12:15 - 13:15 |
Session III: Cyber terrorism & cyber warfare |
Murdoch Watney |
|
Determining when Conduct in Cyberspace constitutes Cyber Warfare in terms of the International law and Tallinn Manual on the International Law Applicable to Cyber Warfare: a Synopsis |
|
Esti Peshin |
|
Regulating the Lawful Interception of Social Network Services: Current Trends |
|
|
|
13:15 - 14:30 |
Lunch |
14:30 - 15:15 |
Session IV: Data Fragment Classification and Automated Analysis |
Rainer Poisel, Marlies Rybnicek, and Simon Tjoa |
|
Taxonomy of Data Fragment Classification Techniques |
|
Fergal Brennan, Martins Udris, and Pavel Gladyshev |
|
An Automated Link Analysis Solution Applied to Digital Forensic Investigations |
|
15:15 - 16:00 |
Session V: Decryption Methods for Digital Forensics |
Shabana Subhair, Balan C, and Thomas KL |
|
Forensic Decryption of FAT BitLocker Volume |
|
16:00 - 16:15 |
Coffee Break |
16:15 - 17:15 |
Session VI: Cloud Investigations |
Lucia De Marco, M-Tahar Kechadi, and Filomena Ferrucci |
|
Cloud Forensics Readiness: Foundations |
|
Joshua James, Ahmed F.Shosha, and Pavel Gladyshev |
|
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE |
|
16:15 - 17:45 |
Session VII: Short Papers |
Deepak Gupta, Babu M. Mehtre |
|
Mozilla Firefox Browsing Artifacts in 3 Different Anti-Forensics Modes |
|
Alexei Dingli |
|
Web page Extractor |
|
Alexei Dingli |
|
Child Abuse Image Detection |
|
18:30 - 21:00 |
Conference Dinner |
Day 2: 27 September 2013, Friday |
|
10:00 - 10:30 |
Session VIII: Hashing |
Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, Alexey |
|
Towards a process model for hash functions in digital forensics |
|
10:30 - 11:30 |
Session IX: Image Forensics |
Martin Steinebach |
|
FaceHash: Face Detection and Robust Hashing |
|
Munkhbaatar Doyoddorj, and Kyung-Hyune Rhee |
|
Robust Copy-Move Forgery Detection Based on Dual-Transform |
|
11:30 - 11:45 |
Coffee Break |
11:45 - 13:15 |
Session X: Digital Forensics - Analysis Techniques |
Neil Rowe |
|
Identifying forensically uninteresting files using a large corpus |
|
Frank Breitinger, Georgios Stivaktakis, and Vassil Roussev |
|
Evaluating Detection Error Trade-offs for Bitwise Approximate Matching Algorithms |
|
Igor Yurievich Yurin |
|
Forensics Assistant: capabilities & specific features of digital forensic software developed in the context of Russian legislation |
|
13:15 - 14:30 |
Lunch |
14:30 - 15:30 |
Session XI: Digital Forensics – Process |
Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili |
|
Computer Profiling for Preliminary Forensic Examination |
|
Joshua James, Pavel Gladyshev |
|
Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations |
|
|
|
15:30 - 16:15 |
Session XII: Data Carving |
Martin Lambertz, Rafael Uetz, and Elmar Gerhards-Padilla |
|
Resurrection: A Carver for Fragmented Files |
|
16:15 - 16:45 |
Coffee Break & Poster Session |
16:45 - 17:45 |
Session XIII: Digital Forensics – Applications & Artifacts |
Asif Iqbal, Hanan Al Obaidli, Andrew Marrington, and Ibrahim Baggili |
|
Amazon Kindle Fire HD Forensics |
|
Prachi Goel, and Babu Mehtre |
|
Forensic Artifacts of flareGet Download Manager |